US11177963B2 - Method for authenticating a user based on an image relation rule and corresponding first user device, server and system - Google Patents
Method for authenticating a user based on an image relation rule and corresponding first user device, server and system Download PDFInfo
- Publication number
- US11177963B2 US11177963B2 US15/839,142 US201715839142A US11177963B2 US 11177963 B2 US11177963 B2 US 11177963B2 US 201715839142 A US201715839142 A US 201715839142A US 11177963 B2 US11177963 B2 US 11177963B2
- Authority
- US
- United States
- Prior art keywords
- image
- user
- user device
- server
- data relating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
-
- G06K9/6201—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1475—Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
Definitions
- the present invention relates generally to a method, a first user device and a server for authenticating a user based on an image relation rule.
- the invention pertains to a system for authenticating a user based on an image relation rule as well.
- the system includes a server and at least two user devices.
- the present invention is notably applicable to a field in which a first user device is e.g. a mobile phone and a second user device is e.g. a Personal Computer (or PC).
- a first user device is e.g. a mobile phone
- a second user device is e.g. a Personal Computer (or PC).
- a user uses a PC (web) browser to submit, through a login page, to a server, a One Time Password (or OTP) that has been previously sent, through a Short Message Service (or SMS) message, to a registered user mobile phone.
- OTP One Time Password
- SMS Short Message Service
- MIB Man-In-the-Browser
- the invention proposes a solution for satisfying the just herein above specified need by providing a method for authenticating a user.
- a server accesses at least one user identifier associated with at least one identifier relating to a first user device and data relating to at least one image to be received, from or through the first user device, as at least one first reference image.
- the first user device accesses the at least one identifier relating to the first user device and data relating to at least one image, as a first image set, to be displayed, by or through the first user device.
- the method comprises:
- the principle of the invention consists in registering at a server an (identified) user, an (identified) first user device with data relating to a first reference image(s) to be provided via the first user device and in initiating from a second user device a connection to the server.
- the server sends back to the second user device one or several images, as a second image set, to be displayed via the second user device and a user request to extract (or submit), via the first user device, an image to be chosen by the user, among one or several images, as a first image set, to be displayed via the first user device.
- the second user device displays (or lets another device display) the received second image set and user request.
- the first user device accesses, besides the first user device identifier, the (locally) registered first image set to be displayed at the first user device side and that includes an image(s) to be selected by the user.
- the first user device displays (or lets display) the (registered) first image set among which there is(are) a first reference image(s) that is(are) registered at the server side.
- the user of the first user device selects a displayed first image(s), namely an image(s) visually selected within the displayed second image set or an image(s) associated with an image(s) visually selected within the displayed second image set according to a rule relating to an image correspondence or an image relation rule that the user and the server both know.
- the first user device transmits to the server the first user device identifier along with data relating to the selected first image(s), as a user request response.
- the server checks, for the (identified) user, whether the (received) data relating to the selected first image(s) matches (or not) the (registered) data relating to the first reference image(s) according to the image relation rule. If the data relating to the selected first image(s) matches the data relating to the first reference image(s) according to the image relation rule, then the server authenticates the user. Otherwise, the server does not authenticate the user.
- Each of the first and second user devices may be a standalone entity or may cooperate with another entity(ies), such as an embedded or removable chip(s), like e.g., a Secure Element (or SE), to authenticate more securely the concerned user.
- entity(ies) such as an embedded or removable chip(s), like e.g., a Secure Element (or SE), to authenticate more securely the concerned user.
- SE Secure Element
- an SE is a smart object that includes a chip(s) that protect(s), as a tamper resistant component(s), access to stored data and that is intended to communicate data with a device(s), like e.g., an SE host device, and/or an SE user.
- the invention authentication solution is based on an image display on the first and second user devices and an image selection by the user via the first user device according to an image relation rule between the image(s) visually selected among the second image set and the image(s) to be selected and submitted among the first image set.
- the image relation rule between the image(s) displayed via the second user device and the image to be selected by the user via the first user device is known to the server and the user.
- Data relating to the user selected first image(s) is then sent within a user request response and compared, at the server side, to data relating to the registered first reference image(s) according to the image relation rule. Only when the data relating to the (received) selected first image(s) and the data relating to the registered first reference image(s) match according to the image relation rule, the server authenticates the user.
- FA Factor Authentication
- the invention authentication solution is simple, easy and quick to use due to its visual aspect.
- the user has just to know the image relation rule and select an image(s), according to the image relation rule that she or he knows (e.g. displayed by or through the second user device).
- the user does not need neither to enter any data, like e.g., an OTP, a number or a text on the first or the second user device nor to manipulate the first or second user device, so as to capture data originating from the server through the second or first user device.
- the invention authentication solution avoids to be spammed at the first user device since the first user device sends the user request response without needing to receive from the server any message/data during the user authentication process. This is particularly interesting when the first user device is a mobile (computer) device.
- the first reference image(s) may be either identical to or associated with an image(s), as a second reference image(s), visually selected among all of the image(s) displayed via the second user device.
- the invention imposes no constraint as to the nature of the first reference image(s) to be selected by the user via the first user device.
- the invention authentication solution includes a server reception, over a first channel, of connection data from the second user device, a server transmission, over the first channel, of user authentication data relating to an image(s) to be displayed via the second user device, as a challenge, and a server reception, over a second channel, of submitted user authentication data relating to a user selected image(s), as a challenge response, from the first user device and a server authentication based on an image relation rule known to the server and the user.
- the user (authentication data) request (or challenge) is conveyed over the first channel linking the second user device and the server while the submitted user (authentication data) response (or challenge response) is conveyed over the second channel linking the first user device and the server.
- the first and second channels are separate from each other.
- Such a use of two separate channels to communicate the required user request (challenge) and user request response data (or challenge response) to authenticate the concerned user allows enhancing the security of the thus exchanged data.
- a potential attacker has to capture data conveyed over the two separate channels to authenticate fraudulently to the server, as the concerned user.
- the first channel may be related to an HyperText Transfer Protocol (or HTTP) (registered trademark) type channel or any other data communication channel.
- the second channel may be related to an Over-The-Air (or OTA) or Over-The-Internet (or OTI) type channel or any other data communication channel.
- HTTP HyperText Transfer Protocol
- OTA Over-The-Air
- OTI Over-The-Internet
- the invention authentication solution based on an image relation rule known to the user and the server is thus secure.
- the user interacts with a second user device to launch a user authentication process with the server and receive back one or several images to be used as a challenge, and the user sends, via the registered first user device, submitted user authentication data relating to an image(s) selected, according to the image relation rule, by the user, as a challenge response.
- the invention authentication solution allows enhancing, with respect to the aforementioned prior art solution, the security against, in particular, a MIB type attack.
- the invention authentication solution allows authenticating securely the user of the second user device and the first user device to be used for sending required user authentication data to be recognized by the server.
- the first user device further accesses and uses security data, like e.g., one or several cryptographic keys, relating to the selected first image(s) and the server further accesses and uses security data, like e.g., one or several cryptographic keys, relating to the first reference image(s).
- security data like e.g., one or several cryptographic keys
- the first user device and the server carry out a strong user authentication.
- the invention is a first user device for authenticating a user.
- the first user device comprises means for accessing at least one identifier relating to the first user device and data relating to at least one image, as a first image set, to be displayed, by or through the first user device.
- the first user device is configured to:
- the first user device may be a user terminal, like e.g., a mobile phone or an SE, or any kind of communicating computing device.
- the invention is a server for authenticating a user.
- the server comprises means for accessing at least one user identifier associated with at least one identifier relating to a first user device and data relating to at least one image to be received, from or through the first user device, as at least one first reference image.
- the server is configured to:
- the invention is a system for authenticating a user.
- the system includes a server and a first user device and at least a second user device.
- the server comprises means for accessing at least one user identifier associated with at least one identifier relating to the first user device and data relating to at least one image to be received, from or through the first user device, as at least one first reference image.
- the first user device comprises means for accessing the at least one identifier relating to the first user device and data relating to at least one image, as a first image set, to be displayed, by or through the first user device.
- the second user device is configured to connect to the server.
- the server is configured to send to the second user device at least one image, as a second image set, to be displayed by or through the second user device and a user request to select, through the first user device, by the user, at least one image within the first image set to be displayed by or through the first user device.
- the second user device is configured to display or let display the second image set and the user request.
- the first user device is configured to:
- the system may include, at the client side, a mobile phone, as a first user device, and a PC, as a second user device.
- FIG. 1 illustrates a simplified diagram of an exemplary embodiment of a system comprising a PC, a server and a mobile phone previously registered at the server side, the system using the PC to launch an on-line user authentication process and receive back a user “challenge” based on an image(s) to be displayed via the PC, and the phone to send to the server data relating to the user selected image(s) among a set of image(s) displayed via the phone, so that the user submits, based on an image relation rule, the data relating to a phone image(s) selected from the phone displayed image set, to authenticate to the server, according to the invention; and
- FIG. 2 represents an example of a flow of messages exchanged between the user, the PC, the server and the phone of the system of FIG. 1 , so that the server authenticates the user, thanks to a use of the PC and the phone, while using two separate channels and the image relation rule shared between the user and the server.
- the invention method for authenticating a user is implemented by two computer devices with one or two user terminals in cooperation with a respective SE.
- the SE as the first or the second user device for authenticating a user, is adapted to perform the functions that are carried out by the PC or the phone respectively and described herein while further providing a secure data storage and/or processing.
- the SE may be an incorporated chip, as a chip soldered, possibly in a removable manner, like e.g., an embedded SE, an embedded Universal Integrated Circuit Card (or eUICC) or an integrated Universal Integrated Circuit Card (or iUICC), on a Printed Circuit Board (or PCB) of an SE host device, or a chip that is coupled to the user terminal, as an SE host device, and included within a Universal Serial Bus (or USB), a smart card or any other medium (that may have different form factors).
- the chip may therefore be fixed to or removable from its host device, like e.g., the PC or the mobile phone.
- the invention does not impose any constraint as to a kind of the SE type.
- FIG. 1 shows schematically a system 10 for authenticating a user 11 with a (mobile) phone 12 , a PC 14 and a (web) server 16 .
- the server 16 may manage several first user devices for each registered user 11 .
- the server 16 manages a plurality of user accounts and corresponding associated first user devices.
- the first user device may be constituted by e.g., a smart phone, a PC, a set-top box, a tablet computer, a desktop computer, a laptop computer, a video player, an audio player, a media-player, a game console, a netbook, a Personal Digital Assistant (or PDA) or any other computer device connected to or including a Man Machine Interface (or MMI).
- a smart phone e.g., a PC, a set-top box, a tablet computer, a desktop computer, a laptop computer, a video player, an audio player, a media-player, a game console, a netbook, a Personal Digital Assistant (or PDA) or any other computer device connected to or including a Man Machine Interface (or MMI).
- PDA Personal Digital Assistant
- MMI Man Machine Interface
- the user 11 desires to benefit from one or several services supplied by or through the server 16 .
- the services provided by or through the server 16 may satisfy Word Wide Web Consortium (or W3C) type rules.
- the user 11 is registered, as one user account, to the server 16 by using e.g., a user name, as a user 11 IDentifier(s) (or ID(s)), so as to access one or several services provided by or through the server 16 .
- the user 11 may identify and select one or several first user devices including the phone 12 that are associated with the (identified) user 11 and to be involved for being authenticated by (or through) the server 16 .
- the phone 12 is thus identified and registered to the server 16 in association with the user 11 ID(s), by using e.g., a Mobile Station International Subscriber Directory Number (or MSISDN), as the phone 12 number, and/or the like, as a phone 12 ID(s), that allow(s) uniquely identifying the phone 12 .
- a Mobile Station International Subscriber Directory Number or MSISDN
- MSISDN Mobile Station International Subscriber Directory Number
- the phone 12 includes one or several (micro)processor(s) and/or (micro)controller(s) (not represented), as data processing means, one or several memories (not represented), as data storing means, and one or several Input/Output (or I/O) interfaces (not represented).
- the phone processor processes data originating from and/or intended to any internal component and data originating from and/or intended to any external device through one or several phone I/O interfaces.
- the phone memories may include one or several EEPROMs (acronym for “Electrically Erasable Programmable Read-Only Memory”), one or several ROMs (acronym for “Read Only Memory”), one or several Flash memories and/or any other memories of different types, like e.g., one or several RAMs (acronym for “Random Access Memory”).
- EEPROMs electrically Erasable Programmable Read-Only Memory
- ROMs acronym for “Read Only Memory”
- Flash memories and/or any other memories of different types, like e.g., one or several RAMs (acronym for “Random Access Memory”).
- the phone I/O interface(s) comprise(s) (and/or is connected to) a display screen 122 and a keyboard 124 , as a phone MMI, so as to interact with the phone user 11 .
- the phone 12 (down)loads preferably a vanilla application, i.e. an application that is not personalized specifically for its concerned user, as a (client) invention (authentication) application.
- the invention application includes or accesses a first set of one or several images, as a generic first image set, to be presented via the phone 12 .
- the invention application preferably includes a secret key Ks, as a shared secret, which is shared with all of the first user devices for all of the users registered or to be registered at the server 16 side.
- the phone processor executes notably, besides an Operating System (or OS), the invention application, when launched preferably by the user 11 .
- OS Operating System
- the generic first image set is preferably used by all of the first user devices for all of the users registered or to be registered at the server 16 side.
- the generic first image set includes a predefined number of images, like e.g., ten.
- the user 11 enters a unique user ID, like e.g., a phone ID.
- a unique user ID like e.g., a phone ID.
- the invention application retrieves automatically a phone ID(s) from a phone memory or a memory of a device (not represented), like e.g., an SE, connected or coupled to the phone 12 .
- the server 16 may present, through the PC MMI, a sequence of a subset, like e.g., four, of the generic first image set, as a generic first image subset.
- the generic first image subset sequence may be randomly generated, by the server 16 , from the generic first image set.
- the user 11 is requested, through the PC MMI, to launch the invention application and select or extract, in the same sequence than the one presented through the PC 14 , a generic first image subset.
- the user 11 launches an execution of the invention application and select the generic first image subset in the same sequence than the one presented through the PC 14 .
- the invention application Based on the user 11 first image subset selection, the invention application generates (or determines) preferably two session keys, namely a Ke for encrypting data to be sent and a Km for signing data to be sent and ensuring an integrity of the data to be sent, so as to establish a secure communication with the server 16 .
- the generation of the Ke and the Km may be based on a key derivation function with three inputs, like e.g., a user ID, the specific first image subset, as selected by the user 11 and the Ks, as the secret shared with the server 16 .
- All of the three inputs are also known to the server 16 which also generates separately the same two session keys Ke and Km for the concerned user 11 with the same inputs.
- the two session keys Ke and Km are used separately at the phone 12 and the server 16 sides to securely communicate between the phone 12 and the server 16 .
- the invention application preferably sends to the server 16 a message for binding the invention application to the concerned user 11 account.
- a binding message includes the user ID, in plain text (i.e. not encrypted), and the phone ID with the user ID that are both encrypted by using the Ke and the Km.
- the user ID is e.g., at the beginning of the binding message, so that the server 16 can use the user ID to also generate the two session keys Ke and Km.
- the binding message is preferably sent, through a secure channel, like e.g., a Transport Layer Security (or TLS) type protocol, to the server 16 .
- a secure channel like e.g., a Transport Layer Security (or TLS) type protocol
- the server 16 reads the user ID and generates the two session keys Ke and Km, based on the user ID, the generic first image subset and the Ks, as the secret shared with the phone 12 .
- the server 16 decrypts the encrypted payload, namely the phone ID with the user ID.
- the server 16 registers, in an associated manner, the user ID, the phone ID and the two session keys Ke and Km. Once the user 11 is registered, the server 16 sends back preferably, while using the two session keys, a confirmation of the user registration possibly with the two session keys Ke and Km to be used for securely communicating between the phone 12 and the server 16 .
- the server 16 may transmit securely to the phone 12 a specific first image set that may have been either generated on the fly or retrieved from a database stored in a memory accessible from the server 16 .
- the server 16 and the phone 16 then both store the same specific first image set in association with the concerned user ID.
- the specific first image set may be used instead of the generic first image set.
- the server 16 may indicate, through the phone 12 , to the user 11 that the phone binding has been successfully completed.
- the phone 12 installs and supports the invention application that may have been personalized for the concerned user 11 .
- the invention application (when executed by a phone 12 processor) allows the user 11 to select an image(s) in the (specific or generic) first image set that is to be presented to the user 11 via the phone 12 according to a rule of a relation with a corresponding image(s) to be visually selected among a second set of one or several images, as a second image set, that are to be presented to the user 11 via the PC 14 and to send to the server 16 data relating to the user selected image(s).
- the phone 12 is able to trigger, under user 11 control, an execution of the invention application.
- the phone 12 is adapted to present or let present to the user 11 , as a generic or specific first image set, the first set of one or several images that are stored in a phone memory (not represented) or a memory of a device (not represented), such as an SE, that is connected or coupled to the phone 12 .
- a phone 12 memory (and/or a memory of another device connected to the phone 12 ) stores one or several phone IDs, such as the MSISDN, an International Mobile Equipment Identity (or IMEI), an email address and/or other data for identifying uniquely the phone 12 , as a first user device.
- phone IDs such as the MSISDN, an International Mobile Equipment Identity (or IMEI), an email address and/or other data for identifying uniquely the phone 12 , as a first user device.
- a phone 12 memory (and/or a memory of another device connected to the phone 12 ) stores data relating to one or several images comprised within the first image set to be presented to the user 11 .
- Each image may be of any type, such as a drawing(s), a picture(s), a photo(s), an icon(s), a text(s), a number(s) and/or some graphical information.
- Each image may be associated with a set of data that includes information, like e.g., a challenge, a transaction identifier and/or a validity date.
- information like e.g., a challenge, a transaction identifier and/or a validity date.
- the data set may be for one time use only or re-usable for a predetermined number of times depending on a security rule.
- the data set may be deleted or removed from the memories at the first user device side, such as the phone 12 , and at the server 16 side that store the data set.
- the data set may be embedded within the presented or displayed graphical information.
- the invention application is able to retrieve the data set by extracting one or several data items to be found from the concerned image.
- the data set may be referenced from one or several external sources, like e.g., one or several images to be presented or displayed and selected by the user 11 among the first image set.
- the invention application is able to retrieve the data set by getting the external source(s) and the corresponding associated data item(s).
- the retrieved data set may be used at least partly, as an input(s), for one or several cryptographic operations, such as a generation of a session key, such as an encryption key Ke or a signature key Km.
- a session key such as an encryption key Ke or a signature key Km.
- the phone 12 MMI (or an MMI of another device connected to the phone 12 ) is preferably used to display the first image set that is locally registered and that is either generic or specific (when the invention application is personalized).
- the phone 12 MMI (or an MMI of another device connected to the phone 12 ) may be used for presenting information to the phone user 11 , like e.g., a message for prompting or requesting the user 11 to select or extract one or several images that are presented or to be presented to the user 11 by or through the phone 12 , as a challenge.
- the phone 12 is arranged to get, among the presented first image set, one or several images that are selected by the user 11 .
- the invention application plays a client role that allows to (up)load information to the server 16 , as a user authentication server.
- the phone I/O interface(s) includes one or several I/O interfaces, like e.g., an antenna 126 , allowing to transmit data, via possibly a communication network(s) (not represented), through a first (communication) channel 13 utilizing a wire and/or wireless link, as a first link, with the server 16 .
- I/O interfaces like e.g., an antenna 126 , allowing to transmit data, via possibly a communication network(s) (not represented), through a first (communication) channel 13 utilizing a wire and/or wireless link, as a first link, with the server 16 .
- the antenna 126 allows communicating, through a Radio-Frequency (or RF) link(s) 13 , as a wireless link(s), via a second (communication) network(s), data to the server 16 .
- RF Radio-Frequency
- the RF may be fixed at several hundreds of MHz, e.g., around 850, 900, 1800, 1900 and/or 2100 MHz, as Long Range (or LR) type RF.
- the first link between the phone 12 and the server 16 is at least mono-directional, namely at least an uplink, i.e. from the phone 12 to the server 16 .
- the first channel 13 may be secure or unsecure.
- the phone 12 is adapted to send, through the first channel 13 , to the server 16 , a retrieved (or user entered) phone ID(s) and the retrieved data relating to the image(s) selected by the user 11 , as a challenge response or a user request response.
- the retrieved data relating to the selected image(s) may include a hash (an identifier(s) or the like) relating to the concerned selected image(s), so as to reduce the number of the data to be sent.
- the phone 12 may generate security data relating to the selected image(s), such as a session key(s), like e.g., one or several cryptographic keys, by using a corresponding generation algorithm(s) that is(are) shared with the server 16 .
- the phone 12 stores (or lets store) the possibly generated (or (downloaded from or through the server 16 ) security data relating to the selected image(s).
- the phone 12 may use an encryption key Ke, as a session key, to encrypt the user request response prior to its sending to the server 16 .
- the phone 12 may use a signature key Km, as a session key, to sign, prior to a data sending to the server 16 , the (possibly previously encrypted) user request response.
- the phone 12 uses the security data relating to the selected image(s), such as the Ke and/or the Km, so as to transfer securely the user request response to the server 16 .
- the phone 12 MMI is used for continuing a user authentication process that has been previously launched via the PC 14 to login (or connect) to the server 16 .
- the user 11 uses the PC 14 to launch a login (or connection) to the server 16 .
- the PC 14 includes one or several (micro)processor(s) and/or (micro)controller(s) (not represented), as data processing means, one or several memories (not represented), as data storing means, and one or several I/O interfaces (not represented).
- the PC processor processes data originating from and/or intended to any internal component and data originating from and/or intended to any external device through one or several PC I/O interfaces.
- the PC 14 supports a (web type) browser application.
- the PC processor executes notably, besides an Operating System (or OS), the browser application.
- OS Operating System
- the browser application may be, as known per se, a Microsoft Internet Explorer (registered trademark), a Mozilla Firefox (registered trademark) application or any other browser application.
- the client is a proprietary application, such as a desktop application, i.e. an application that is typically only accessible by an issuer (or provider) of the considered application, that allows to exchange data with the server 16 .
- a proprietary application such as a desktop application, i.e. an application that is typically only accessible by an issuer (or provider) of the considered application, that allows to exchange data with the server 16 .
- the browser application plays a client role that allows to (up)load information to the server 16 to trigger a login or connection to the server 16 .
- the browser application is also preferably used to (down)load information, as a challenge or a user request, from the server 16 .
- the PC I/O interface(s) comprise(s) (and/or is connected to) a display screen 142 and a keyboard 144 , as an MMI, so as to interact with the PC user 11 .
- the PC MMI may be used for launching a user authentication process through the client to the server 16 .
- the PC I/O interface(s) includes one or several I/O interfaces for exchanging data, via a second communication network (not represented), through a second (communication) channel 15 utilizing a wire or wireless link, with the server 16 .
- the PC 14 is adapted to send to the server 16 , through the second channel 15 , a user ID and a request to get one or several images, as a challenge that allows the user to authenticate.
- the second link between the PC 14 and the server 16 is bidirectional.
- the second channel 15 may be secure or unsecure.
- the PC I/O interface with the server 14 may use a HTTP, a File Transfer Protocol (or FTP) and/or any other data communication protocol(s), so as to communicate with the server 16 .
- HTTP HyperText Transfer Protocol
- FTP File Transfer Protocol
- the PC 14 is able to trigger, preferably under user 11 control, an execution of the browser application (or the like), and access, through the browser, the server 16 , to authenticate the user 11 .
- the PC 14 is able to send, from the user 11 , through the PC MMI or an MMI connected or coupled to the PC 14 and the browser (or the like), via the second channel 15 , to the server 16 a user ID, like e.g., a user name and/or a mobile phone number.
- a user ID like e.g., a user name and/or a mobile phone number.
- the PC 14 is arranged to receive, from the server 16 , as a second image set, a set of one or several images to be presented by or through the PC 14 .
- the PC 14 MMI (or an MMI of another device connected or coupled to the PC 14 ) is preferably used for displaying the second image set received from the server 16 .
- the PC 14 may be arranged to receive, from the server 16 , besides the second image set, a user request to select, through the phone 12 , one or several images within the first image set to be displayed by or through the phone 12 .
- the user request to select, through the phone 12 , one or several images within the first image set to be displayed by or through the phone 12 may be implicit, i.e. not presented by or through the PC 14 , or explicit, i.e. presented by or through the PC 14 .
- the PC 14 MMI (or an MMI of another device connected or coupled to the PC 14 ) may be used for displaying information to the PC user 11 , like e.g., a message for prompting or requesting the user 11 to select or extract one or several images that are presented or to be presented to the user 11 by or through the phone 12 , as a challenge.
- the server 16 is connected to the PC 14 over the second channel 15 .
- the server 16 is remote and accessible through one, two or more communication networks, such as an Intranet network and/or an Internet network, that allow to define or form the second channel 15 .
- communication networks such as an Intranet network and/or an Internet network, that allow to define or form the second channel 15 .
- the server 16 is also accessible through a mobile radio-communication network(s) or the like allowing to define or form the first channel 13 .
- the second channel 15 is separate or distinct from the first channel 15 .
- the second channel 15 may be secure or unsecure.
- the server 16 is local.
- the server 16 is embedded within a device, such as the PC 14 or an SE that is connected or coupled to the PC 14 .
- the server 16 may be operated or managed by a Mobile Network Operator (or MNO), a Mobile Virtual Network Operator (or MVNO), a banking Operator, a wire communication network operator, a service Operator (or administrator) or on behalf of a service Operator, as a service provider.
- MNO Mobile Network Operator
- MVNO Mobile Virtual Network Operator
- banking Operator a wire communication network operator
- service Operator or administrator
- the server 16 comprises several I/O interfaces (not represented) for communicating with external devices, such as two user devices 12 and 14 , for each concerned user 11 , and one or several (micro)processors (not represented), as data processing means, which are internally linked together.
- the server 16 comprises (and/or is connected to) one or several memories 162 , as a server memory.
- the server memory 162 stores preferably, besides an OS, an invention (user) authentication application accessible from the server 16 processor.
- the server memory 162 stores a database.
- the database includes a set of user accounts.
- Each user account includes one or several user identifiers, such as a user name, associated with one or several first user device identifiers, and data relating to one or several first reference images to be received from or through a concerned identified first user device.
- each user account includes, in association with the identified user, a rule of relation of an image(s) to be visually selected from a set of one or several images, as a second image set, to be (down)loaded from (or through) the server 16 to a second user device, once the second user device has launched a login (or connection) to the server 16 , and an image(s) to be selected from a set of one or several images, as a first image set, to be presented or displayed via a registered first user device.
- Such an image relation rule is presented to the user 11 by or through the second user device, or is shared, as a secret, e.g. through a mail or the like, with the user 11 .
- the server 16 may be configured to generate the image relation rule to be known by the server 16 and the concerned (identified) user 11 .
- the image(s) to be visually selected from the second image set is referred as a second reference image(s).
- the server 16 is configured to generate on-the-fly, i.e. when a second user device launches a login (or connection) session with the server 16 , one or several second reference images that do(es) not match with any of the registered first reference image(s).
- the server 16 is arranged to retrieve, from a memory included within or connected (or coupled) to the server 16 , one or several second reference images that do(es) not match with any of the registered first reference image(s).
- the image relation rule may be an identity of the second reference image(s) and the first reference image(s), as the image(s) to be selected by the user 11 from the first image set, or a particular association between the second and the first reference image(s).
- the particular association between the second and the first reference image(s) may include the first reference image(s) is(are) distinct from and complementary to the second reference image(s), so as to form, when the first reference image(s) and the second reference image(s) is(are) put together, a corresponding complete predetermined figure.
- the first reference image(s) is(are) distinct from and complementary to the second reference image(s), so as to form, when the first reference image(s) and the second reference image(s) is(are) put together, a corresponding complete predetermined figure.
- a right part of a heart, as the second reference image, and a left part of the heart, as the associated first reference image the left and right parts of the heart form when put together a corresponding complete heart.
- the particular association between the second and the first reference image(s) may include the first reference image(s) is(are) distinct from and complementary to the second reference image(s), so as to form, when the first and the second reference image(s) are associated with each other, a corresponding predetermined family.
- a first animal, as the second reference image, and a second animal, as the associated first reference image the first animal and the second animal form when associated a corresponding animal family.
- Such a given image relation rule association list is not exhaustive.
- Other image relation rule may be given while having one or several points or particularities in common.
- the server 16 may be adapted to send or receive the image relation rule to or from a registered first user device respectively.
- the registered first user device receiving or issuing the image relation rule may be either the one used for authenticating the user during a registration or a first user device binding process or after the registration or first user device binding process, or a different first user device.
- the server 16 is arranged to receive, through a channel 15 , from or through the PC 14 , as a client, a user ID(s), so as to identify the concerned (registered) user 11 during a thus launched login (or connection) session.
- the server 16 is adapted to send, through the channel 15 , to the PC 14 one or several images, as a second image set, to be presented or displayed by or through the PC 14 .
- the second image set includes one or several second reference images that are registered at the server 16 side according to the image relation rule.
- the second image set as a challenge generated for a user authentication session, may be distinct from a subsequent second image set for the same user. In such a case, the second image set is valid only for a given session.
- the server 16 is preferably adapted to send, through the channel 15 , to the PC 14 , as a challenge, a user request to select, through a (registered) first user device, by the user 11 , one or several images, as a first image set, to be presented or displayed by or through the first user device.
- the server 16 is further arranged to receive, through an out-of-band channel 13 , as a challenge or user request response, one or several identifiers relating to a first user device along with data relating to one or several selected first images.
- Such a user request response reception allows continuing, for the identified user, the login (or connection) session launched previously by the second user device.
- the use of the out-of-band channel 13 prevents a MiB from intercepting both the challenge and the challenge response data and data mining for the image relation rule, as the secret shared between the user 11 and the server 16 .
- the server 16 may generate security data relating to the first reference image(s), such as one or several cryptographic keys, by using a corresponding generation algorithm(s) that may have been shared with the concerned first user device.
- the server 16 stores (or lets store) the possibly generated security data relating to the first reference image(s).
- the server 16 may use a decryption key Ke, as a session key, to decrypt an encrypted user request response received from or through the concerned first user device.
- the server 16 may use a signature verification key Km (or a corresponding public key), as another session key, to verify a signature relating to the user request response that is received from or through the concerned first user device.
- the server 16 uses the security data relating to the first reference image(s), so as to receive securely the user request response from the concerned first user device.
- the server 16 is adapted to verify, for the identified user, whether the data relating to the selected first image(s) does or does not match the data relating to the first reference image(s) according to the image relation rule.
- the server 16 is configured to succeed in authenticating the user 11 if the data relating to the selected first image(s) matches the data relating to the first reference image(s) according to the image relation rule.
- the server 16 is configured to fail to authenticate the user 11 if the data relating to the selected first image(s) does not match the data relating to the first reference image(s) according to the image relation rule.
- FIG. 2 depicts an example of a message flow 20 that involves the user 11 , the phone 12 , the PC 14 and the server 16 , so that the server 16 authenticates the user 11 based on an image relation rule (namely a rule between a first image to be selected, by the user 11 of the phone 12 , among a first image set displayed through the phone 12 and a second image to be visually selected, by the user 11 of the PC 14 , among a second image set displayed through the PC 14 ).
- an image relation rule namely a rule between a first image to be selected, by the user 11 of the phone 12 , among a first image set displayed through the phone 12 and a second image to be visually selected, by the user 11 of the PC 14 , among a second image set displayed through the PC 14 .
- the server 16 has previously registered (not represented) the user 11 ID in association with the phone 12 number, as a phone ID, a first reference image identifier (a first image hash or the like), as data relating to a first reference image to be received from the phone 12 , and the image relation rule.
- the first reference image is e.g. a picture of a particular star singer.
- the user 11 appreciates particularly the considered star singer.
- the associated second reference image is e.g. a picture of an anonym singer, according to the image relation rule which is related to the star singer of whom the user 11 is fond of, as the considered art.
- the phone 12 thus constitutes a reference first user (communication) device to be locally present within the user environment including the PC 14 , as another user device, so as to authenticate the user 11 .
- the phone 12 accesses the phone 12 number, one or several images, as a first image set, to be displayed by the phone 12 and the first reference image identifier, as data relating to the first reference image, so as to be successfully authenticated.
- the user 11 launches 22 an execution of a client supported by the PC 14 and enters a user ID, so that the user 11 logs in firstly to the server 16 .
- the client is automatically launched while entering automatically a user ID (i.e. without any involvement of the user 11 ).
- the PC 14 connects to a login portal of the server 16 .
- the PC 14 transmits to the server 16 , through a client channel using e.g., an HTTP type protocol, as a first channel, one or several messages 24 that include the user ID and implicitly or explicitly a request to get an image set, as a second image set.
- a client channel using e.g., an HTTP type protocol, as a first channel, one or several messages 24 that include the user ID and implicitly or explicitly a request to get an image set, as a second image set.
- the server 16 identifies 26 the user 11 based on the user ID.
- the server 16 may generate at least partly or access (not represented) a second image set that includes one or several images to be displayed by the PC 14 .
- the second image set includes a second reference image that satisfies the image relation rule with the first reference image to be received by the server 16 from the phone 12 .
- the server 16 gets (not represented) the second image set.
- the server 16 sends to the PC 14 one or several messages 28 including the second image set to be displayed by the PC 14 and implicitly or explicitly a user request to select, through the phone 12 , by the user 11 , one image comprised within a first image set to be displayed by the phone 12 .
- the PC 14 displays 210 either sequentially or all of the images at once of the second image set.
- the second image set includes the second reference image and possibly one or several images which are not associated, according to the image relation rule, with the first reference image.
- the PC 14 may display the user request, such as “Please select one image of the first image set using your image relation rule”, to select, through the phone 12 , by the user 11 , one image among the image(s) to be displayed by the phone 12 and comprised in the first image set.
- the user 11 sees the PC display screen 142 and the thus displayed second image set.
- the user 11 selects (not represented) visually the image (i.e. without selecting the concerned image by e.g., clicking on a corresponding displayed image on the PC display screen 142 ) which she or he knows to be, according to the image relation rule, the second reference image that matches with, i.e. corresponds or coincides with, the first reference image.
- the user 11 launches 212 an execution of the invention application supported by the phone 12 .
- the phone 12 gets (not represented) the first image set that is locally registered.
- the phone 12 displays 214 either sequentially or all of the images at once of the second image set.
- the second image set includes the second reference image and possibly one or several images which are not associated, according to the image relation rule, with the first reference image.
- the user 11 selects 216 an image by e.g., clicking on a corresponding displayed image on the phone display screen 122 , as the selected image.
- the phone 12 gets 218 data relating to the selected image that shall be the first reference image identifier, as the data relating to the first reference image that is registered at the server 16 side, to authenticate successfully the user 11 .
- the phone 12 generates 220 (detailed information of an example generation algorithm is given infra) an encryption key Ke and/or a signature key Km, as one or two cryptographic keys, as security data relating to the selected first image.
- the phone 12 may use (not represented) the stored (previously generated by the phone 12 ) security data relating to the selected first image, so that the phone 12 sends securely the user request response to the server 16 .
- the phone 12 thus encrypts, by using the Ke, the first image identifier, as the data relating to the selected first image, and/or signs, by using the Km, the first image identifier, as the data relating to the selected first image.
- the phone 12 sends, through e.g., a Short Message Service (or SMS), Multimedia Messaging Service (or MMS), Transmission Control Protocol/Internet Protocol (or TCP/IP), or HTTP type channel, as an out-of band channel, one or several messages 222 that include the user ID and the first image identifier, as the data relating to the selected first image, that may be previously encrypted and/or signed.
- SMS Short Message Service
- MMS Multimedia Messaging Service
- TCP/IP Transmission Control Protocol/Internet Protocol
- HTTP type channel as an out-of band channel
- messages 222 that include the user ID and the first image identifier, as the data relating to the selected first image, that may be previously encrypted and/or signed.
- the server 16 identifies 224 , based on the user ID that is received in plain text, the concerned user 11 and her or his account.
- the server 16 generates 226 an encryption key Ke and/or a signature key Km, as one or two cryptographic keys, as security data relating to the first reference image.
- Ke and/or the Km is(are) generated identically and separately at the phone 12 and server 16 sides as follows:
- the server 16 may use (not represented) the previously generated (by the server 16 ) security data relating to the first reference image.
- the server 16 thus decrypts, by using the Ke (or a corresponding key), the first reference image identifier, as the data relating to the first reference image, and/or verifies, by using the Km (or a corresponding key), the signed first image identifier, as the data relating to the selected first image.
- the server 16 verifies 228 (after a possible received data decryption and/or a possible verification of the received data signature) whether the first image identifier, as the data relating to the selected first image, does or does not match the first reference image identifier, as the data relating to the first reference image, according to the image relation rule.
- the server 16 succeeds in authenticating the user 11 and grants user access to a service(s) managed by or through the server 16 .
- the server 16 fails to authenticate the user 11 and denies user access to the service(s) managed by or through the server 16 .
- the server 16 generates 230 a corresponding authentication result, such as user authentication success or user authentication failure.
- the server 16 sends 232 preferably to the PC 14 , through the original channel, a message 232 that includes a request to present or display the authentication result. Then, the PC 14 presents or displays (or lets display) the authentication result (not represented), such as “User authentication failure” or “User authentication success”.
- the server 16 sends to the phone 12 , through the out-of band channel, a message (not represented) that includes a request to present or display the authentication result. Then, the phone 12 presents or displays (or lets display) the authentication result (not represented), such as “User authentication failure” or “User authentication success”.
- the invention authentication solution is visual, simple, intuitive and practical for the user.
- the invention authentication solution allows improving the spam prevention (e.g. in the context of GSMA Mobile connect) since the first user device initiates a sending of the user request response to the server.
- the invention authentication solution also provides an alternative flow from a general out-of-band flow. Instead of the server 16 sending a push type message to the phone 12 , according to the invention authentication flow, the phone 12 initiates preferably a connection and sends a message 222 , such as an SMS, to the server 16 .
- the invention authentication solution may offer a strong cryptographically secure 2FA for online access to the server.
- the invention solution allows carrying out a secure user authentication based on a local presence of the registered first user device that allows sending, through an out-of-band channel, the user request response which the user 11 infers from her or his knowledge of the image relation rule.
- the embodiment that has just been described is not intended to limit the scope of the concerned invention. Other embodiments may be given.
- the first user device may communicate through any Short Range RF technology(ies), like e.g., a Wi-Fi, Bluetooth, a Near Field Communication or a Bluetooth Low Energy type technology(ies).
- any Short Range RF technology(ies) like e.g., a Wi-Fi, Bluetooth, a Near Field Communication or a Bluetooth Low Energy type technology(ies).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Artificial Intelligence (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Life Sciences & Earth Sciences (AREA)
- Facsimiles In General (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
-
- connecting, from a second user device, to the server;
- sending, from the server to the second user device, at least one image, as a second image set, to be displayed by or through the second user device, and a user request to select, through the first user device, by the user, at least one image comprised within the first image set to be displayed by or through the first user device;
- displaying, by or through the second user device, the second image set and the user request;
- displaying, by or through the first user device, the first image set;
- selecting, by the user of the first user device, within the displayed first image set, at least one displayed first image, as at least one selected first image, the at least one selected first image matching with at least one image visually selected within the displayed second image set, according to an image relation rule known to the user and the server;
- sending, from the first user device to the server, as a user request response, the at least one first user device identifier accompanied with data relating to the at least one selected first image;
- verifying, by the server, for the identified user, whether the data relating to the at least one selected first image does or does not match the data relating to the at least one first reference image according to the image relation rule; and
- succeeding, by the server, in authenticating the user if the data relating to the at least one selected first image matches the data relating to the at least one first reference image according to the image relation rule.
-
- display, by or through the first user device, the first image set;
- let select, by the user of the first user device, at least one displayed first image, as at least one selected first image, the at least one selected first image matching with at least one image visually selected within at least one image, as a second image set, displayed by or through a second user device, according to an image relation rule known to the user and a server; and
- send to the server, as a user request response, the at least one first user device identifier accompanied with data relating to the at least one selected first image.
-
- be connected from a second user device;
- send to the second user device at least one image, as a second image set, to be displayed by or through the second user device, and a user request to select, through the first user device, by the user, at least one image comprised within at least one image, as a first image set, to be displayed by or through the first user device;
- receive, as a user request response, at least one first user device identifier accompanied with data relating to at least one selected first image;
- verify, for the identified user, whether the data relating to the at least one selected first image does or does not match the data relating to the at least one first reference image according to an image relation rule known to the user and the server; and
- succeed in authenticating the user if the data relating to the at least one selected first image matches the data relating to the at least one first reference image according to the image relation rule.
-
- display or let display the first image set;
- let select, by the user of the first user device, at least one displayed first image, as at least one selected first image, the at least one selected first image matching with at least one image visually selected within the displayed second image set, according to an image relation rule known to the user and the server; and
- send to the server, as a user request response, the at least one first user device identifier accompanied with data relating to the at least one selected first image.
The server is configured to: - verify, for the identified user, whether the data relating to the at least one selected first image does or does not match the data relating to the at least one first reference image according to the image relation rule; and
- succeed in authenticating the user if the data relating to the at least one selected first image matches the data relating to the at least one first reference image according to the image relation rule.
-
- Derived Key=PBKDF2 (PRF, SelectedImageData, UserID, IterationCount, KeyLength) in which:
- PBKDF2 is the Password-Based Key Derivation Function 2, as described in Public Key Cryptography Standards (or PKCS) #5 and Request For Comments (or RFC) 2898;
- PRF is a Pseudo-Random Function of two parameters, a key and a message. For example, PRF is Hash Message Authentication Code (or HMAC)—Secure Hash Algorithm 1 (or SHA) 1;
- SelectedImageData acts as a master password from which a key is derived. The master password is entered or submitted by the
user 11 in the form of a selected image(s). For a registration flow, it is a sequence of e.g. 4 images selected from a set of e.g. 10 images (in the right order). For an authentication flow, it is the single image selected from e.g. the 6 available on thephone 12. In both cases, theserver 16 is able to perform the same image “selection” since theserver 16 knows which image(s) theuser 11 should have selected. Each image is associated with data, in which the data length is configurable. For example, the data length is 32 bytes (i.e. 256 bits) (which is far more than data length of a character in a typical alpha-numeric Personal Identification Number (or PIN) a data length of which is 1 byte). Such an image data length increases the entropy of the possible derived keys; - UserID may act as the salt;
- IterationCount is the number of desired iterations; and
- KeyLength is the length of the derived key. The key length may be set to twice the session key length. The output key material may then be divided into two keys: Ke and Km MAC (Message Authentication Code). For example, when the derived key is split, the KeyLength is 512 bits when using the AES 256 symmetric encryption algorithm.
- Derived Key=PBKDF2 (PRF, SelectedImageData, UserID, IterationCount, KeyLength) in which:
Claims (9)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/839,142 US11177963B2 (en) | 2017-12-12 | 2017-12-12 | Method for authenticating a user based on an image relation rule and corresponding first user device, server and system |
PCT/EP2018/083997 WO2019115393A1 (en) | 2017-12-12 | 2018-12-07 | Method for authenticating a user based on an image relation rule and corresponding first user device, server and system |
ES18815685T ES2981975T3 (en) | 2017-12-12 | 2018-12-07 | Method for authenticating a user based on a relationship rule between images and corresponding first user device, server and system |
EP18815685.5A EP3724798B1 (en) | 2017-12-12 | 2018-12-07 | Method for authenticating a user based on an image relation rule and corresponding first user device, server and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/839,142 US11177963B2 (en) | 2017-12-12 | 2017-12-12 | Method for authenticating a user based on an image relation rule and corresponding first user device, server and system |
Publications (2)
Publication Number | Publication Date |
---|---|
US20190182050A1 US20190182050A1 (en) | 2019-06-13 |
US11177963B2 true US11177963B2 (en) | 2021-11-16 |
Family
ID=64661396
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/839,142 Active 2038-08-20 US11177963B2 (en) | 2017-12-12 | 2017-12-12 | Method for authenticating a user based on an image relation rule and corresponding first user device, server and system |
Country Status (4)
Country | Link |
---|---|
US (1) | US11177963B2 (en) |
EP (1) | EP3724798B1 (en) |
ES (1) | ES2981975T3 (en) |
WO (1) | WO2019115393A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210103652A1 (en) * | 2019-10-07 | 2021-04-08 | International Business Machines Corporation | Authentication based on image classification |
WO2024073120A1 (en) | 2022-09-30 | 2024-04-04 | Thales DIS CPL USA, Inc | System and method of imaged based login to an access device |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9800762B2 (en) * | 2015-03-03 | 2017-10-24 | Ricoh Company, Ltd. | Non-transitory computer-readable information recording medium, information processing apparatus, and communications system |
US11042626B2 (en) * | 2018-05-21 | 2021-06-22 | Nextek Power Systems, Inc. | Method of and system for authenticating a user for security and control |
US11356477B2 (en) | 2019-08-05 | 2022-06-07 | Twilio Inc. | Verifying incoming communications |
US11245526B2 (en) | 2019-12-05 | 2022-02-08 | Identité, Inc. | Full-duplex password-less authentication |
US20230388297A1 (en) * | 2022-05-25 | 2023-11-30 | T-Mobile Innovations Llc | Multimedia message (mms) object sequences as multi-factor authentication (mfa) for user identification in 5g |
Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090327138A1 (en) * | 2008-01-28 | 2009-12-31 | AuthWave Technologies Pvt. Ltd. | Securing Online Transactions |
US20100043062A1 (en) * | 2007-09-17 | 2010-02-18 | Samuel Wayne Alexander | Methods and Systems for Management of Image-Based Password Accounts |
US20100120396A1 (en) * | 2008-11-13 | 2010-05-13 | Patrick Faith | Device including authentication glyph |
US20110072493A1 (en) * | 2008-05-30 | 2011-03-24 | Taichiro Morishita | Data providing device, operation device, data processing device, operation system, control program, and computer-readable recording medium storing control program |
US20110145899A1 (en) * | 2009-12-10 | 2011-06-16 | Verisign, Inc. | Single Action Authentication via Mobile Devices |
US20110231656A1 (en) * | 2010-03-16 | 2011-09-22 | Telcordia Technologies, Inc. | System and methods for authenticating a receiver in an on-demand sender-receiver transaction |
US8165303B1 (en) * | 2007-05-03 | 2012-04-24 | Adobe Systems Incorporated | Method and apparatus for public key cryptography |
US20130023241A1 (en) * | 2010-03-26 | 2013-01-24 | Igrove, Inc. | Authentication method and system using portable terminal |
US20130039484A1 (en) * | 2011-08-08 | 2013-02-14 | Industrial Technology Research Institute | Verification method and system |
US20130068837A1 (en) * | 2011-09-19 | 2013-03-21 | Google Inc. | Mobile computing device authentication using scannable images |
US8594632B1 (en) * | 2012-12-11 | 2013-11-26 | Intel Corporation | Device to-device (D2D) discovery without authenticating through cloud |
US8667560B2 (en) * | 2010-08-31 | 2014-03-04 | At&T Intellectual Property I, L.P. | Authenticating a user with picture messaging |
US20140108810A1 (en) * | 2012-10-16 | 2014-04-17 | Symantec | Performing client authentication using certificate store on mobile device |
US20140372754A1 (en) * | 2013-06-13 | 2014-12-18 | Selim Aissi | Image based key derivation function |
US20150052349A1 (en) * | 2013-05-03 | 2015-02-19 | Akamai Technologies, Inc. | Splicing into an active TLS session without a certificate or private key |
US20150089613A1 (en) * | 2013-09-20 | 2015-03-26 | Verizon Patent And Licensing Inc. | Method and system for providing zero sign on user authentication |
US20150302571A1 (en) * | 2013-12-11 | 2015-10-22 | Nantmobile, Llc | Recognition-based authentication, systems and methods |
US20160352722A1 (en) * | 2012-08-19 | 2016-12-01 | Rajul Johri | Authentication Based On Visual Memory |
US20170257363A1 (en) * | 2016-03-04 | 2017-09-07 | Secureauth Corporation | Secure mobile device two-factor authentication |
US20170302642A1 (en) * | 2014-09-30 | 2017-10-19 | Tokon Security Ab | Method for providing information from an electronic device to a central server |
US20170331817A1 (en) * | 2016-05-12 | 2017-11-16 | Bank Of America Corporation | Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques |
US20170346851A1 (en) * | 2016-05-30 | 2017-11-30 | Christopher Nathan Tyrwhitt Drake | Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements. |
US20180123795A1 (en) * | 2015-05-07 | 2018-05-03 | Appbus, Inc. | Secure Container Platform for Resource Access and Placement on Unmanaged and Unsecured Devices |
US20180139192A1 (en) * | 2016-11-15 | 2018-05-17 | Vmware, Inc. | Adaptive Token Cache Management |
US10158646B1 (en) * | 2016-10-10 | 2018-12-18 | Charles Schwab & Co., Inc. | System and method for providing a web service using a mobile device capturing dual images |
-
2017
- 2017-12-12 US US15/839,142 patent/US11177963B2/en active Active
-
2018
- 2018-12-07 WO PCT/EP2018/083997 patent/WO2019115393A1/en unknown
- 2018-12-07 ES ES18815685T patent/ES2981975T3/en active Active
- 2018-12-07 EP EP18815685.5A patent/EP3724798B1/en active Active
Patent Citations (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8165303B1 (en) * | 2007-05-03 | 2012-04-24 | Adobe Systems Incorporated | Method and apparatus for public key cryptography |
US20100043062A1 (en) * | 2007-09-17 | 2010-02-18 | Samuel Wayne Alexander | Methods and Systems for Management of Image-Based Password Accounts |
US20090327138A1 (en) * | 2008-01-28 | 2009-12-31 | AuthWave Technologies Pvt. Ltd. | Securing Online Transactions |
US20110072493A1 (en) * | 2008-05-30 | 2011-03-24 | Taichiro Morishita | Data providing device, operation device, data processing device, operation system, control program, and computer-readable recording medium storing control program |
US20100120396A1 (en) * | 2008-11-13 | 2010-05-13 | Patrick Faith | Device including authentication glyph |
US20110145899A1 (en) * | 2009-12-10 | 2011-06-16 | Verisign, Inc. | Single Action Authentication via Mobile Devices |
US20110231656A1 (en) * | 2010-03-16 | 2011-09-22 | Telcordia Technologies, Inc. | System and methods for authenticating a receiver in an on-demand sender-receiver transaction |
US20130023241A1 (en) * | 2010-03-26 | 2013-01-24 | Igrove, Inc. | Authentication method and system using portable terminal |
US8667560B2 (en) * | 2010-08-31 | 2014-03-04 | At&T Intellectual Property I, L.P. | Authenticating a user with picture messaging |
US20130039484A1 (en) * | 2011-08-08 | 2013-02-14 | Industrial Technology Research Institute | Verification method and system |
US20130068837A1 (en) * | 2011-09-19 | 2013-03-21 | Google Inc. | Mobile computing device authentication using scannable images |
US20160352722A1 (en) * | 2012-08-19 | 2016-12-01 | Rajul Johri | Authentication Based On Visual Memory |
US20140108810A1 (en) * | 2012-10-16 | 2014-04-17 | Symantec | Performing client authentication using certificate store on mobile device |
US8594632B1 (en) * | 2012-12-11 | 2013-11-26 | Intel Corporation | Device to-device (D2D) discovery without authenticating through cloud |
US20150052349A1 (en) * | 2013-05-03 | 2015-02-19 | Akamai Technologies, Inc. | Splicing into an active TLS session without a certificate or private key |
US9537847B2 (en) | 2013-06-13 | 2017-01-03 | Visa International Service Association | Image based key derivation function |
US20140372754A1 (en) * | 2013-06-13 | 2014-12-18 | Selim Aissi | Image based key derivation function |
US20150089613A1 (en) * | 2013-09-20 | 2015-03-26 | Verizon Patent And Licensing Inc. | Method and system for providing zero sign on user authentication |
US20150302571A1 (en) * | 2013-12-11 | 2015-10-22 | Nantmobile, Llc | Recognition-based authentication, systems and methods |
US20170302642A1 (en) * | 2014-09-30 | 2017-10-19 | Tokon Security Ab | Method for providing information from an electronic device to a central server |
US20180123795A1 (en) * | 2015-05-07 | 2018-05-03 | Appbus, Inc. | Secure Container Platform for Resource Access and Placement on Unmanaged and Unsecured Devices |
US20170257363A1 (en) * | 2016-03-04 | 2017-09-07 | Secureauth Corporation | Secure mobile device two-factor authentication |
US20170331817A1 (en) * | 2016-05-12 | 2017-11-16 | Bank Of America Corporation | Preventing Unauthorized Access to Secured Information Systems Using Multi-Device Authentication Techniques |
US20170346851A1 (en) * | 2016-05-30 | 2017-11-30 | Christopher Nathan Tyrwhitt Drake | Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements. |
US10158646B1 (en) * | 2016-10-10 | 2018-12-18 | Charles Schwab & Co., Inc. | System and method for providing a web service using a mobile device capturing dual images |
US20180139192A1 (en) * | 2016-11-15 | 2018-05-17 | Vmware, Inc. | Adaptive Token Cache Management |
Non-Patent Citations (1)
Title |
---|
Notification of Transmittal of the International Search Report and the Written Opinion of the International Searching Authority (Forms PCT/ISA/220, PCT/ISA/210, and PCT/ISA/237) dated Feb. 25, 2019, in corresponding International Application No. PCT/EP2018/083997. (11 pages). |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210103652A1 (en) * | 2019-10-07 | 2021-04-08 | International Business Machines Corporation | Authentication based on image classification |
US11455386B2 (en) * | 2019-10-07 | 2022-09-27 | International Business Machines Corporation | Authentication based on image classification |
WO2024073120A1 (en) | 2022-09-30 | 2024-04-04 | Thales DIS CPL USA, Inc | System and method of imaged based login to an access device |
Also Published As
Publication number | Publication date |
---|---|
EP3724798A1 (en) | 2020-10-21 |
US20190182050A1 (en) | 2019-06-13 |
ES2981975T3 (en) | 2024-10-14 |
WO2019115393A1 (en) | 2019-06-20 |
EP3724798B1 (en) | 2024-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3724798B1 (en) | Method for authenticating a user based on an image relation rule and corresponding first user device, server and system | |
AU2020244394B2 (en) | Method, requester device, verifier device and server for proving at least one piece of user information | |
US11539690B2 (en) | Authentication system, authentication method, and application providing method | |
EP3208732A1 (en) | Method and system for authentication | |
CN113711211A (en) | First-factor contactless card authentication system and method | |
US11271922B2 (en) | Method for authenticating a user and corresponding device, first and second servers and system | |
EP3669293B1 (en) | Method for authenticating a user and corresponding user devices, server and system | |
US9124571B1 (en) | Network authentication method for secure user identity verification | |
US20200196143A1 (en) | Public key-based service authentication method and system | |
US10263973B2 (en) | Method for accessing a service, corresponding first device, second device and system | |
US11777743B2 (en) | Method for securely providing a personalized electronic identity on a terminal | |
US20200403782A1 (en) | Method and chip for authenticating to a device and corresponding authentication device and system | |
EP2916509A1 (en) | Network authentication method for secure user identity verification | |
CN111404680B (en) | Password management method and device | |
AU2021304822B2 (en) | Method, user device, verifier device, server and system for authenticating user data while preserving user privacy | |
KR101576038B1 (en) | Network authentication method for secure user identity verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: GEMALTO SA, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GEMALTO INC.;REEL/FRAME:046550/0633 Effective date: 20180209 Owner name: GEMALTO INC., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FAMECHON, BENOIT;SIDDIQUI, NAJAM;LU, KAREN HONGQIAN;AND OTHERS;SIGNING DATES FROM 20180102 TO 20180109;REEL/FRAME:046550/0604 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: THALES DIS FRANCE SA, FRANCE Free format text: CHANGE OF NAME;ASSIGNOR:GEMALTO SA;REEL/FRAME:064716/0634 Effective date: 20190716 |
|
AS | Assignment |
Owner name: THALES DIS FRANCE SAS, FRANCE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THALES DIS FRANCE SA;REEL/FRAME:064792/0714 Effective date: 20211215 |